A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
An Asymmetric Traceability Scheme for Copyright Protection without Trust Assumptions
[chapter]
2001
Lecture Notes in Computer Science
Traceability schemes (also known as traitor tracing schemes) have been proposed as a method to establish copyright protection of broadcast information. With asymmetric traceability, the merchant cannot frame an innocent user, while no user can abuse the system without being detected. We propose an asymmetric solution for traceability, based on a very efficient symmetric scheme [4]. We do not make any trust assumptions about the broadcasting center or other authorities. Furthermore, we establish
doi:10.1007/3-540-44700-8_18
fatcat:tkvroyliljbf7knbnatsbeeffi